Skip Ribbon Commands Skip to main content

2012

 

Enrollment of Vendors and Grantees (EVG) Report1- The purpose of this project was to examine in detail how NIH enrolls external organizations and their staff for access to NIH systems. The goal was to identify any reusable services that would make it easier and less costly for NIH and its external business partners (such as vendors and grantees) to access NIH systems, while ensuring both the security of those systems and the privacy of external staff.

Unified Communications Domain Team Report 1- The purpose of this report is to provide an overview of Unified Communications, summarize the current state of UC requirements for NIH, and to summarize a target-state for NIH.  This report serves primarily as a technically-focused document, describing technology architectures and standards to apply in implementing UC services at NIH. 

Cloud Storage Domain Team Report​ 1- The purpose of this research report is to provide an overview of cloud storage, summarize the current state of storage requirements for NIH, and to serve as the foundation for target-state decision making in regards to how cloud storage can be used at NIH.  

 

2010

SOA Artifacts : The Office of Director conducted NIH SOA Assessment in 2009. Service-Oriented Architecture (SOA) is an architectural style, not a technology. The general notion of "services" is well-established and widely used in business organizations. SOA helps those designing software for essentially the same reasons that the service concept helps in organizing business services.

The following documents were provided for the SOA Strategy and Assessments.

 

Consensus Based Decision Making1 This paper initiates the implementation of a consensus-based decision process that can be applied to data and information technology decisions as a best practice.

 

2007

Enterprise Architecture: Engaging and Empowering People While Creating Opportunity for Change - This paper provides information about the users of the NIH Enterprise Architecture and their needs. By researching different users' behavior, NIH identified different user groups and ways to effectively increase users' understanding of enterprise architecture and the NIH Enterprise Architecture in particular and how to empower users to apply the NIH Enterprise Architecture.
 

2006

Collaboration Architecture (January 25, 2006) - This report documents the Collaboration Domain Team's analysis and describes the
recommended architecture standards and guidelines to be implemented across the NIH.
 

2005

Secure Email Architecture (December 1, 2005) - This report documents the Security Domain Team's analysis and describes the recommended NIH-wide architectural standards and guidelines for a non-public key interface (PKI)-based secure email communication solution between NIH and external parties.
 
Network Architecture (February 8, 2005) - This report establishes network architectural standards and guidelines across the NIH
and specifies agreed-upon common components that can be implemented enterprise wide.
 

2004

Application Integration Technology Architecture (July 26, 2004) - This report specifies the technical architecture for integration of and with enterprise applications at the NIH.
 
Collaboration Architecture (June 22, 2004) - This document establishes collaboration architecture standards and guidelines across NIH and specifies common components that have been developed and agreed upon by two other separate cross-Institute and Center (IC) domain teams and can be implemented enterprise wide.
 
Enterprise Systems Management Architecture - Enterprise Systems Monitoring (April 21, 2004) - This document establishes the NIH Enterprise Systems Management (ESM) architecture that can be implemented enterprise wide​.
 

2003

Collaboration Architecture (July 18, 2003) - This report establishes standards and guidelines to apply across NIH, while forging a common vision of the future for enterprise messaging at NIH.
 
Security Architecture1 (July 18, 2003) - This document provides a level of information security that is commensurate with risk in the most
efficient manner possible.

 

 

1 Access requires NIH Login.​



Last Updated: July 25, 2012